Publication Date
In 2025 | 2 |
Since 2024 | 10 |
Since 2021 (last 5 years) | 18 |
Since 2016 (last 10 years) | 41 |
Since 2006 (last 20 years) | 303 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
Practitioners | 184 |
Teachers | 79 |
Administrators | 56 |
Policymakers | 38 |
Researchers | 24 |
Media Staff | 22 |
Students | 7 |
Parents | 6 |
Community | 3 |
Location
Canada | 47 |
United States | 35 |
United Kingdom | 34 |
Australia | 25 |
California | 25 |
Japan | 21 |
New York | 19 |
Ohio | 18 |
Pennsylvania | 17 |
Minnesota | 16 |
Texas | 16 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
ACT Assessment | 1 |
Hidden Figures Test | 1 |
Learning Style Inventory | 1 |
What Works Clearinghouse Rating
Does not meet standards | 1 |
Katharina C. Cramer; Nicolas V. Rüffin – Minerva: A Review of Science, Learning and Policy, 2025
Political interest in Research Infrastructures on a European scale has been a new phenomenon, marked in the early 2000s with the launch of the Lisbon Strategy and the European Research Area. European Research Infrastructure policy then developed through, first, the strategic incorporation of incumbents through new modes of coordination; second,…
Descriptors: Research, Foreign Countries, Computer Networks, Computer Interfaces
Kathy D. Lohr – New Directions for Adult and Continuing Education, 2025
Having access to the Internet and acquiring the skills necessary to use, question, and create in a digital environment have become essential to living and working in the 21st century. Yet, this move to digitalization has created a digital divide between those who have broadband "access" and the "skills and attitudes" to…
Descriptors: Digital Literacy, Access to Internet, Equal Education, Global Approach
Ayadi, Mohamed Issam; Maizate, Abderrahim; Ouzzif, Mohammed; Mahmoudi, Charif – International Journal of Web-Based Learning and Teaching Technologies, 2021
In this paper, the authors propose a novel forwarding strategy based on deep learning that can adaptively route interests/data packets through ethernet links without relying on the FIB table. The experiment was conducted as a proof of concept. They developed an approach and an algorithm that leverage existing intelligent forwarding approaches in…
Descriptors: Computer Networks, Artificial Intelligence, Mathematics, Models
Reg Leichty – State Education Standard, 2024
Elementary and secondary schools increasingly face an onslaught of ransomware and other cyberattacks, which jeopardize sensitive data and the integrity of their digital infrastructure. The consequences of these attacks can be severe and costly, eroding community trust, disrupting learning, and permanently damaging equipment. The alarming scope and…
Descriptors: Elementary Secondary Education, Computer Security, State Boards of Education, Role Theory
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Wilmers, Annika; Fahrer, Sigrid – International Association for Development of the Information Society, 2022
Drawing on research syntheses from the meta project Digi-EBF as well as the German Education Server, this contribution discusses how web products and services offered by the Information Center for Education at DIPF | Leibniz Institute for Research and Information in Education address and support educational communities. In the area of research…
Descriptors: Educational Technology, Access to Information, Communities of Practice, Foreign Countries
Sarthak Punj; Poorvi Kejriwal; S. P. Raja – International Journal of Learning and Change, 2024
Technology is advancing and metaverse is gaining popularity. The magic of metaverse is beyond our imagination. In simple terms, the metaverse refers to a virtual shared space that exists online, where people can interact, socialise, work, and play using digital avatars, just like they do in the real world. It is a combination of virtual reality,…
Descriptors: Computer Simulation, Computer Mediated Communication, Health Services, Social Media
Teresa Swist; Thilakshi Mallawa Arachchi; Jenna Condie; Benjamin Hanckel – Learning, Media and Technology, 2024
The COVID-19 pandemic sparked an unprecedented expansion of educational technologies and digitisation of the university sector, and also amplified existing inequalities and crises. In this paper, we introduce the 'socio-technically just pedagogies framework' to systemically explore curriculum-making, student-staff partnerships, knowledge…
Descriptors: Foreign Countries, College Students, College Faculty, Teacher Student Relationship
Livia Tomás; Ophélie Bidet – International Journal of Social Research Methodology, 2024
Qualitative research has been strongly affected by the COVID-19 pandemic, highlighting the possibilities that Voice over Internet Protocol (VoIP) technologies such as Skype, WhatsApp, and Zoom offer to qualitative scholars. Based on the experience of using such technologies to collect qualitative data for our PhD studies, we present how we dealt…
Descriptors: Telecommunications, Qualitative Research, Interviews, Interpersonal Relationship
Meng Qu – Education and Information Technologies, 2024
This paper introduces a Patron Counting and Analysis (PCA) system that leverages Wi-Fi-connection data to monitor space utilization and analyze visitor patterns in academic libraries. The PCA system offers real-time crowding information to the public and a comprehensive visitor analysis dashboard for library administrators. The system's…
Descriptors: Academic Libraries, Users (Information), Use Studies, Space Utilization
Glassman, Michael – Educational Philosophy and Theory, 2019
Since early development of information technologies, in particular computers and the Internet, there has been tension between those who believe these new technologies and their applications they have been mired in tension. Originally conceived and developed as tools for enabling high level, nonhierarchal engagement in problem-solving and…
Descriptors: Online Courses, Information Technology, Computer Networks, Learner Engagement
Frydenberg, Mark – Information Systems Education Journal, 2023
The Internet of Things (IoT) is a network of objects that can exchange data with other devices also connected to the Internet. One of the most common consumer examples of IoT is home automation, as a variety of smart devices, including doorbells, lightbulbs, thermostats, and refrigerators are now available which users can control remotely using…
Descriptors: Internet, Computer Software, Automation, Information Technology
Bottum, Jim; Smith, Dale; Grandon, Alex; Hofmann, Russell – Tribal College Journal of American Indian Higher Education, 2022
For a tribal college or university (TCU), cyberinfrastructure includes not only the campus computer labs, servers, routers, and software applications, but the classroom technology, research laboratories, library facilities, and personnel who operate and maintain these resources. The cyberinfrastructure at a TCU is a foundational tool that ties the…
Descriptors: Capacity Building, Information Technology, Computer Networks, Tribally Controlled Education
Emily Paget – Journal of Learning for Development, 2024
Digital and information literacy skills are necessary to succeed in today's knowledge economy but for the millions of people in the world without internet access, a frustratingCatch-22 exists: How can they develop digital literacy skills without internet access? When they get access, what good is the internet to them if they don't have the skills…
Descriptors: Information Literacy, Digital Literacy, Video Technology, Access to Computers
Clark, J. R.; Niederjohn, M. Scott; Wood, William C. – Social Education, 2018
The cryptocurrency Bitcoin has been prominently featured in the news recently. Its ascension in value has been nothing short of extraordinary. This article briefly explains what Bitcoin is and how it works. The more challenging question is what Bitcoin--this cryptographic breakthrough--really is: currency, like the U.S. dollar, an asset, more like…
Descriptors: Monetary Systems, Definitions, Computer Networks, Consumer Economics